Consulting with a Conscience™

A cruciallogics blog

close
Written by Amol Joshi
on November 09, 2018

Based on the recent Ontario cannabis store data breach it is our bold prediction that the cannabis industry will be the next biggest target for hackers and bad actors.

It's actually not that bold a prediction — it's common sense. Where there's lot of money there are many attempts to breach. And this is a major new growing industry.

Unfortunately, the headline above is going to be far too common unless the leaders of cannabis industry start taking technology seriously.

That's not to say at all that this is unusual. Unfortunately, like every other industry, technology is the last thing that everyone thinks about.

Why? Because technology is something that seems easily available. You can register a business, buy a computer, sign up for a website, get an email address from your website provider, sign up for storage, get an antivirus, all with very few steps. The problem is security isn't a given.

You bring on employee #1, 2 and 3 — and you already got computers for them, signed them with an email from your web service provider, and generally onboarded them.

This works until you have about 10 employees. Then, keeping track of it starts getting difficult. You find you don't have control, and security is a free-for-all. Sooner than you expect, that lack of control means people start signing up for services that are not corporate approved that may sound great in theory but with no one validating them it's only a matter of time until you're the one on the front page with a data breach.

On average, it takes 46 days to resolve a cyber attack at the cost of $21,555 per day. And it doesn’t end there. A loss of customers, dealing with law enforcement, regulatory fines, public relations nightmare is what follows.

All this could be avoided with one simple word: Standardization

The easiest way to manage security is to standardize.

  1. Standardize on the technologies you and your teams use
  2. Select technologies that integrate well with one another — have a single pane of glass to control permissions and deployment of various technologies.
  3. Proper document management and data classification process and policies
  4. Strategically plan and deploy security defences such as firewalls, antivirus protections, url filtering, etc. What and how you select is a strategic decision: not a technology decision
  5. Centralize your updates and patch management
  6. Educate your staff 

Security is not rocket science — as long as you think about it before it is too late.

CrucialLogics is a Microsoft Gold Partner with deep knowledge of the cybersecurity needs of companies of all sizes. Interested in learning more? We've compiled a collection of resources aimed at business leaders right here.


 Read more about this.

You may also like:

Security

How the Hackers Stole Christmas

Since the Covid-19 pandemic began, most of our business activities have been conducted remotely online giving hackers mo...

Cloud Strategy Collaboration Security

Simplify Identity Management Using Azure AD Connect

If your company utilizes both cloud and local environments, you don’t want your employees have to use separate authentic...

Collaboration Security

6 Benefits of Managed Compliance with CrucialLogics and Minerva™

Compliance driven organizations who have to align their security standards against a global security framework face a tr...